The need to feel safe and secure has its origins at the earliest steps of our development, which makes sense, as we most probably wouldn’t survive otherwise. The same applies for our digital world, where we have to be constantly on alert over potentially falling prey to cyber criminals. With m ...

The Domain Name System (DNS) is one of the most important services in IP-based networks and a prime target for hackers. Therefore, you might be interested in the following few useful tips to minimize the risks of DDoS and mitigate damage.

According to the Asia Cyber Savviness Report, released by ESET, 93% of online users in Asia worry about cyber security. In its recent report, the global provider of security solutions highlights that the region still has a long way to go in understanding online security and protecting themselves.

The Microsoft Cloud and System Center expert, Cireson, revealed its new Password Reset app, which is part of the much-anticipated Identity Management Solution for Microsoft System Center Service Manager. The launch comes after the recent unveiling of the Cireson Platform, which combines the very bes ...

Hacks can paralyze websites or allow data theft, harming the reputation and consequently sales of concerned companies enormously. In the following, we take a look at the procedures of cybercriminals and their goals, as well as defence against the dreaded DDoS attacks.

In today’s highly connected world, security and privacy are paramount, and security-conscious organizations depend on solutions to keep their data safe and their information private.Without doubt, the need for protection is growing, with passwords and access restrictions that are unfortunately oft ...

The Asia Pacific Web Application Firewall (WAF) market grew 34% in the past two years, reaching a total market size of $155.6 million in 2014, according to the analysts of Frost & Sullivan. The strong growth momentum was driven by the rise in eCommerce and Internet banking activities over the pa ...

The consumer electronics giant Samsung just announced that it expects 90% of its devices to be connected to the Internet of Things by 2017, which corresponds with Cisco’s prediction of having 50 billion connected devices by the end of the decade. Quite obviously, the Internet of Things (IoT) is pr ...

Business- and production processes can’t be run without information technology anymore and digital marketing is definitely sitting in the front row here. However, although the risks of cyberattacks can threaten the existence of companies, many still don’t seem to be sufficiently aware of them.

When it comes to privacy laws, they often collide in different countries in the truest sense of the word. There are quite rigid requirements on the one hand and broad, interpretable laws, that allow unrestricted government access, on the other hand. However, to what extend do strict laws protect?

“In today’s cybersecurity arena, the notion of using a traditional perimeter firewall as your primary line of defense is no longer the impenetrable wall it used to be, as hackers and malicious actors consistently find ways to sneak past the first trusted layer of defense”, states Thycotic, a p ...

Advanced Persistent Threats (APTs) exploit the key weaknesses of today’s common IT infrastructures in order to steal intellectual property and sabotage business-critical production environments, explains Imperva, a leading provider of cyber security solutions. The company is specialized in protect ...

Stagefright, a vulnerability that allows attackers to steal information from Android devices, was discovered just a couple of weeks ago. This flaw allows attackers to steal information from Android devices through remotely executed code via a maliciously crafted multimedia messaging service message ...

Malicious software, in the form of Trojans and worms, is still the greatest threat on the Internet: Trojans perform dangerous actions unnoticed on affected devices, while worms spread themselves over the Internet and can damage infected computers.

Vaultize, a leader in enterprise file security, provides a mobile content management (MCM) platform facilitated through data access rights that allows corporate IT to prevent data loss on their mobile devices. In fact, Vaultize allows granular control over every file that passes through it, includin ...

We have always to discern between good and evil, right? Well, our digital and technology-driven world is no exception. Here, we have to differentiate between good and evil bots: Some are helpful and facilitate our daily lives; others are not to be trifled with. The bad bots are often machines that a ...

"An effective CISO can no longer rely on his or her technical expertise alone. They must understand how strategic initiatives create risks and develop security programs that balance the need to drive business performance with the growing realities and complexities of protecting customers, intellectu ...

With recent reports predicting that the Asia Pacific region will see the largest growth in smart city initiatives over the next 10 years, many have focused on the cost saving benefits and efficiencies that technology can deliver. In fact, a recent report predicted the number of smart cities worldwid ...

Acronis, a global leader in new generation data protection, just announced the release of Acronis True Image Cloud and Acronis True Image 2016.Powered by the AnyData Engine and set apart by its image technology, Acronis delivers easy, complete and safe file access and sharing, as well as backup and ...

About Us

MediaBUZZ is the first ‘pure’ digital publisher in the region, making an impact in Asia Pacific since 2004. Designed to empower marketers in the vibrant, ever-changing electronic marketing environment, its publication Asian eMarketing covers the digital age and zooms in on the most valuable and indispensable tools of today’s marketers. Circulated weekly to more than 60,000 top management and marketing decision-makers, the useful and informative articles support e-marketers in finding a sound marketing strategy, vital for their growing business success.